General

  • Target

    915_8170fa34df7d78e7b0f6e09f7b3a2dd7a0ed2fa4b79939d7ee79e4bf03aedc81.zip

  • Size

    511KB

  • Sample

    231114-pgssjacb8t

  • MD5

    2d82f4c0cc6d6e657f64236eff3f6843

  • SHA1

    ac54a470f35738aece84225c9e7d5152b5a34c5a

  • SHA256

    f043c2cac52d85b0c614b2175f1574500580b787607815680022bc3cad2c021a

  • SHA512

    64dc92154716d2ef027a7cbb2a8398f00232674486fe41593f125cdac61d9f3e720d9f20bcda9b911447c3e71eab2819ddfddb8b6aa1752a36468e162fc61989

  • SSDEEP

    12288:SnrnvIv+nfEzoEavZRw7c0ONxME7aus3dEqw+BnNJwrEcy:Sn7vIkEfURkc011P3+NgNJwrPy

Malware Config

Extracted

Family

azorult

C2

http://185.29.10.12/2023/Panel/index.php

Targets

    • Target

      9379_13112023_Bank Transfer Copy_pdf.exe

    • Size

      614KB

    • MD5

      08659bc44365a408b013e68d8bc8a996

    • SHA1

      b9af8c172849ba0b59567a5387bd9067e6ef30d8

    • SHA256

      4cb149ab8d4c479d15760084f0de97e7bbfe3abb1f70623be19835213b03ba66

    • SHA512

      7905d143768d73be107b14651406211a20065c5440bbcdc14ffc7a149df718f7c157efd0109bcec9229dd9e8bdf6ac49ec9b6cae78708f080339a7e8a54c940d

    • SSDEEP

      12288:cijW1/tFVzWXGINE2VGCbAJRys5jzMz9LrPWUT8d:XRJVGCbORhlELruUT8

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks